By: Morey J. Haber, Vice President of Technology, BeyondTrust How much money would you spend to secure your passwords from being stolen? If you actually could safeguard all your passwords, would you worry as much about a privileged breach? I think the majority of executives and security professionals would ante up a reasonable sum … Continue reading A Penny Wise and a Password Foolish→

By: Jon Masters, chief ARM architect, Red Hat Recent press reports talk about a newly discovered form of security threat that involves attackers exploiting common features of modern microprocessors (aka chips) that power our computers, tablets, smartphones, and other gadgets. These attacks, known as “Meltdown” and “Spectre”, are getting a lot of attention. People … Continue reading What are Meltdown and Spectre? Here’s what you need to know→